Abstract

Under the environment of the big data, the correlation between the data makes people have a greater demand for privacy. Moreover, the world has become more diversified and democratic than ever before. Freedom of speech is considered to be very important; thus, anonymity is also a very important security demand. The research of our paper proposes a scheme which can ensure both the privacy and the anonymity of a communication system, that is, the protection of message privacy while ensuring the users’ anonymity. It is based on anonymous identity-based encryption (IBE), by which the users’ metadata are protected. We implement our scheme in JAVA with Java pairing-based cryptography library (JPBC); the experiment shows that our scheme has significant advantage in efficiency compared with other anonymous communication system. Internet-of-Things (IoT) involves many devices, and privacy of devices is very significant. Anonymous communication system provides a secure environment without leaking metadata, which has many application scenarios in IoT.

Highlights

  • In the era of big data, data privacy has become significant as more personal and organizational information is involved

  • Anonymous communication system has a high-level demand for security; we may consider a mechanism for entering into the anonymous communication system before starting communication

  • We describe the details of system entities and system architecture ; we present the security goals of anonymous communication

Read more

Summary

Introduction

In the era of big data, data privacy has become significant as more personal and organizational information is involved. Tor is secure as each server knows only its predecessor and successor rather than other servers’ position in the chain; the servers do not know the specific path of a message’s transmission, which guarantees the anonymity of both the sender and recipient That is how it offers a practical scheme of identity protection. The second category is based on the DC-net [19, 20], for instance, verdict [21] and dissent [22] Those schemes work on an N-member group, who can communicate anonymously, and only one group member is allowed to send a valid message in a given round. (1) The user can send and receive the ciphertext during the same round, which means a user can be both a sender and a recipient at the same time This can improve the efficiency of anonymous communication system.

Related Work
Preliminaries
Architecture of the System
Anonymous Communication via Anonymous IBE
Security Analysis
Evaluation
Conclusions
Conflicts of Interest
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call